19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6 IPSec VPN <strong>QoS</strong> <strong>Design</strong><br />

Version 3.3<br />

Site-to-Site V3PN <strong>QoS</strong> Considerations<br />

However, IPSec VPNs present many unique considerations for <strong>QoS</strong> design, including the following<br />

(each is discussed in detail throughout the rest of the chapter):<br />

IPSec VPN modes of operation<br />

Packet overhead increases because of encryption<br />

cRTP and IPSec incompatibility<br />

Prefragmentation<br />

Bandwidth provisioning<br />

Logical topologies<br />

Delay budget increases because of encryption<br />

ToS byte preservation<br />

<strong>QoS</strong> Pre-Classify feature<br />

Pre-encryption queuing<br />

Anti-Replay implications<br />

Control plane provisioning<br />

IPSec VPN Modes of Operation<br />

Three principal modes of IPSec VPN operation exist:<br />

IPSec Tunnel Mode (No IP GRE Tunnel)<br />

IPSec Transport Mode with an Encrypted IP GRE Tunnel<br />

IPSec Tunnel Mode with an Encrypted IP GRE Tunnel<br />

The advantages, disadvantages, features, and limitations of these options are discussed next.<br />

IPSec Tunnel Mode (No IP GRE Tunnel)<br />

This option does not utilize an IP GRE tunnel. With this option, only IPSec unicast traffic can be<br />

transported. (IP multicast traffic cannot be transported between IPSec peers without configuring an IP<br />

GRE tunnel.)<br />

This configuration might be sufficient to support application requirements; its advantage lies in lower<br />

CPU overhead (primarily at the headend IPSec VPN router) compared with alternative IPSec design<br />

options.<br />

IPSec security associations (SAs) are created for each access list line matched. An access list must be<br />

specified in the crypto map to designate packets that are to be encrypted. Such an access list typically<br />

entails several lines to define the application(s) to be encrypted by the five ACL tuples:<br />

source/destination IP address, protocol, and source/destination port numbers. When not encrypting a<br />

GRE tunnel, it is possible to create a separate SA for each application or access-list line match or to<br />

create an SA that carries all traffic that matches an ACL range (which is recommended). Each SA has<br />

its own Encryption Security Protocol (ESP) or Authentication Header (AH) sequence number.<br />

Anti-Replay drops can be eliminated or minimized by constructing access lists that create a separate<br />

security association for each class of traffic being influenced by per-hop <strong>QoS</strong> policies. (Anti-Replay is<br />

an IPSec standard feature that discards packets that fall outside a receiver’s 64-byte sliding window<br />

because such packets are considered suspect or potentially compromised—it is discussed in greater<br />

detail later in this chapter.)<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

6-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!